curl / Docs / Vulnerability table / 7.12.3 vulnerabilities

Vulnerabilities in curl 7.12.3

curl version 7.12.3 was released on December 20 2004. The following 37 security problems are known to exist in this version.

FlawFrom versionTo and includingCVECWE
FTP path trickery leads to NIL byte out of bounds write7. Heap-based Buffer Overflow
HTTP authentication leak in redirects6.07.57.0CVE-2018-1000007CWE-522: Insufficiently Protected Credentials
FTP PWD response parser out of bounds read7.77.55.1CVE-2017-1000254CWE-126: Buffer Over-read
--write-out out of buffer read6.57.53.1CVE-2017-7407CWE-126: Buffer Over-read
printf floating point buffer overflow7.17.51.0CVE-2016-9586CWE-121: Stack-based Buffer Overflow
cookie injection for other servers7.17.50.3CVE-2016-8615CWE-187: Partial Comparison
case insensitive password comparison7.77.50.3CVE-2016-8616CWE-178: Improper Handling of Case Sensitivity
OOB write via unchecked multiplication7.17.50.3CVE-2016-8617CWE-131: Incorrect Calculation of Buffer Size
double-free in curl_maprintf7.17.50.3CVE-2016-8618CWE-415: Double Free
double-free in krb5 code7.37.50.3CVE-2016-8619CWE-415: Double Free
curl_getdate read out of bounds7. Buffer Over-read
Use-after-free via shared cookies7. Use After Free
invalid URL parsing with '#' Encoding Error
IDNA 2003 makes curl use wrong host7. Inappropriate Encoding for Output Context
curl escape and unescape integer overflows7. Incorrect Calculation of Buffer Size
TLS session resumption client cert bypass7.17.50.0CVE-2016-5419CWE-305: Authentication Bypass by Primary Weakness
Re-using connections with wrong client cert7.17.50.0CVE-2016-5420CWE-305: Authentication Bypass by Primary Weakness
Windows DLL hijacking7. Improper Control of Generation of Code ('Code Injection')
NTLM credentials not-checked for proxy connection re-use7. Authentication Bypass by Primary Weakness
sensitive HTTP server headers also sent to proxies7.17.42.0CVE-2015-3153CWE-201: Information Exposure Through Sent Data
Negotiate not treated as connection-oriented7. Authentication Bypass by Primary Weakness
Re-using authenticated connection when unauthenticated7. Authentication Bypass by Primary Weakness
URL request injection6.07.39.0CVE-2014-8150CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
cookie leak with IP address as domain7.17.37.1CVE-2014-3613CWE-201: Information Exposure Through Sent Data
IP address wildcard certificate validation7.17.35.0CVE-2014-0139CWE-297: Improper Validation of Certificate with Host Mismatch
wrong re-use of connections7. Authentication Bypass by Primary Weakness
re-use of wrong HTTP NTLM connection7. Authentication Bypass by Primary Weakness
URL decode buffer boundary flaw7.77.30.0CVE-2013-2174CWE-126: Buffer Over-read
cookie domain tailmatch6.07.29.0CVE-2013-1944CWE-201: Information Exposure Through Sent Data
SSL CBC IV vulnerability7. Improper Enforcement of Message Integrity
inappropriate GSSAPI delegation7. Improper Preservation of Permissions
data callback excessive length7. Function Call with Incorrectly Specified Arguments
embedded zero in cert name7.47.19.5CVE-2009-2417CWE-170: Improper Null Termination
Arbitrary File Access6.07.19.3CVE-2009-0037CWE-142: Improper Neutralization of Value Delimiters
URL Buffer Overflow7. Heap-based Buffer Overflow
NTLM Buffer Overflow7. Stack-based Buffer Overflow
Authentication Buffer Overflows7.37.13.0CVE-2005-0490CWE-121: Stack-based Buffer Overflow

Changelog for curl 7.12.3

See vulnerability summary for the previous release: 7.12.2 or the subsequent release: 7.13.0